Wardriving and surviving: who else is using your Wi-Fi?

Author

Senior Lecturer in Electrical and Computer Engineering, RMIT University

Disclosure statement

Mark A Gregory does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

The “wardriving” project involves police driving the streets of Queensland, searching for unsecured Wi-Fi coming from houses and businesses.

(Given Wi-Fi signals can have a range of up to 100 metres, a family’s Wi-Fi connection can be accessible from well outside the home.)

When an open or poorly secured Wi-Fi access point is found, it is logged by Queensland Police, who will later send a letter with information on how to secure Wi-Fi access points (such as routers).

What does “unsecured Wi-Fi” mean? Well, it means there is no password set and that open access to the Wi-Fi access point is available to anyone with a compatible device.

“Poorly secured” Wi-Fi refers to access points that are set up using older security measures, such as Wired Equivalent Privacy (WEP). WEP is an encryption system that utilises a security technique developed in 1999 and which was outdated and replaced in 2003 by Wi-Fi Protected Access (WPA).

“Having WEP encryption is like using a closed screen door as your sole means of security at home. The WPA or WPA2 security encryption is certainly what we would recommend as it offers a high degree of protection.”

According to Hay, the consequences of not acting could be significant:

“Unprotected or unsecured wireless networks are easy to infiltrate and hack,” he said. “Criminals can then either take over the connection and commit fraud online or steal the personal details of the owner. This is definitely the next step in identity fraud.”

Furthermore, a person that has access to open residential Wi-Fi can use this connection to browse the web or or illegally download movies, music or – at the extreme end – child pornography.

“It could be quite difficult to prove that it wasn’t in fact you [downloading copyrighted or illegal material].”

This is potentially a major problem for residential Wi-Fi users and one that the Queensland Police has decided to reduce by committing resources from the Fraud and Corporate Crime Group.

Another concern is that Wi-Fi users often have mobile devices and computers connected to the one broadband connection. As a result, when someone gains access to their open Wi-Fi they can access all of the devices and computers on that home network.

A long drive

The Queensland Police wardriving effort is certainly not the first of its kind. In fact, wardriving has been occurring since the inception of Wi-Fi in the 1990s.

The Queensland Police have commenced the project and to ensure they do not commit a breach of privacy have configured their systems to collect only limited information; just enough to be able to identify open or poorly secured Wi-Fi so the owner can be notified.

And when you look at the statistics, it seems there are a lot of homeowners that need to be notified.

In a test done across Sydney in July 2011, the Sydney Morning Herald identified “unsecured Wi-Fi networks in ten out of 20 residential locations … In total, 328 networks were detected with 2.6% operating without password protection.”

Needless to say, the problem of unsecured Wi-Fi is not an exclusively Australian problem.

In December 2004, students worked to map Wi-Fi in Seattle over a few weeks and found 5,225 Wi-Fi access points, of which 44% were secured with WEP encryption, 52% were open, and 3% were pay-for-access.

The wardriving by students in Seattle was legal, but several issues – such as privacy, security and people downloading pornography – were identified.

The information collected by students identified that in areas with large numbers of overlapping Wi-Fi access points, signals can cause interference and open wireless networks can cause security risks. Students found some of the Wi-Fi access points had names “Open to share, no porn please” and “Free access, be nice”.

Tools of the trade

Over the years, many tools have been developed to assist in the capture of Wi-Fi details during a wardrive. One classic wardriving tool is NetStumbler. Other, more modern, tools can be found at wardrive.net.

After Wi-Fi access point information is collected using one of the above tools, the data can be uploaded to an online map, such as those featured on wigle.net.

A map of Wi-Fi connections in Melbourne from wigle.net.wigle.net

The results from Queensland Police’s wardriving efforts are yet to be seen but in the meantime, it would be wise to make sure your Wi-Fi is being used by you, and no-one else.